<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Architecture Support for Flexible Chain Management</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">R</forename><surname>Seguel</surname></persName>
							<email>r.e.seguel@tue.nl</email>
							<affiliation key="aff0">
								<orgName type="department">School of Industrial Engineering</orgName>
								<orgName type="laboratory">Information Systems Group</orgName>
								<orgName type="institution">Eindhoven University of Technology</orgName>
								<address>
									<country key="NL">The Netherlands</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">R</forename><surname>Eshuis</surname></persName>
							<email>h.eshuis@tue.nl</email>
							<affiliation key="aff0">
								<orgName type="department">School of Industrial Engineering</orgName>
								<orgName type="laboratory">Information Systems Group</orgName>
								<orgName type="institution">Eindhoven University of Technology</orgName>
								<address>
									<country key="NL">The Netherlands</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">P</forename><surname>Grefen</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">School of Industrial Engineering</orgName>
								<orgName type="laboratory">Information Systems Group</orgName>
								<orgName type="institution">Eindhoven University of Technology</orgName>
								<address>
									<country key="NL">The Netherlands</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Architecture Support for Flexible Chain Management</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">C08C8D76C4243C8F2E625A567E1F8A9A</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T19:00+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Business Chains</term>
					<term>Dynamic Service Outsourcing</term>
					<term>Interacting Services</term>
					<term>Protocol Adaptor</term>
					<term>Service Adaptation</term>
					<term>Software Architecture</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In competitive markets, organizations collaborate in business chains using dynamic service outsourcing to deliver complex products and services. To enable the flexible formation of business chains, organizations can use protocol adaptation to ensure that their business protocols are compatible. In this paper, we present three different software architectures that enable the flexible formation and enactment of different chain structures, in which the protocol adaptation component is a key enabler. We show the feasibility of the approach by extending software architecture definitions from the literature for each flexible chain formation case.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Nowadays, the production of complex products and services in competitive markets involves a number of autonomous organizations <ref type="bibr" target="#b7">[8]</ref> that collaborate in business chains. By locating the customer order decoupling point (CODP) in the business chain we identify three chain structures: demand chain, supply chain and hybrid demand/supply chain <ref type="bibr" target="#b12">[13]</ref>. The CODP indicates how deeply the customer order penetrates into a business chain. Due to the shorter life-cycles and increasing complexity of products and services <ref type="bibr" target="#b5">[6]</ref>, the organizations in a business chain collaborate in a just-in-time fashion, using dynamic service outsourcing. In dynamic service outsourcing, an organization outsources a part of its business process, for instance order fulfillment, to a partner that is selected at the last possible moment from the marketplace <ref type="bibr" target="#b5">[6]</ref>. This way, the organizations collaborate by invoking functionalities from each other according to their business protocols in their public process view <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b3">4]</ref>. Each public process view abstracts an underlying private business processes that is executed by the organization.</p><p>In current dynamic service outsourcing approaches <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref>, the tacit assumption is made that interacting protocols are compatible: each sent message is received and processed by the other party, and thus no deadlocks occur. However, collaborating organizations have their own protocol that specifies their own way of working and they may easily have incompatible protocols. Since organizations 5th SIKS/BENAIS Conference on Enterprise Information Systems collaborate in a just-in-time fashion, incompatible business protocols hinder the flexible formation of business chains. To configure business chains in a flexible way the organizations can use protocol adaptation to ensure that their business protocols are compatible <ref type="bibr" target="#b12">[13]</ref>.</p><p>The goal of this paper is to present a supporting software architecture for each flexible chain formation case that we described in <ref type="bibr" target="#b12">[13]</ref>. The software architectures are an extension and integration of two software architectures from the literature <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref> that support the formation and enactment of supply and demand chain networks. The presented software architectures include business protocol adaptation as a key component to support the flexible configuration and enactment of business chains. The protocol adaptation component constructs an adaptor to resolve (if possible) incompatibilities between interacting services during chain formation, using any existing adaptation method <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b9">[10]</ref><ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref>.</p><p>Although there is some work on cross-organizational workflow collaboration using process views <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b7">8,</ref><ref type="bibr" target="#b8">9]</ref> they do not include adaptation in their architecture definitions. In this paper, we focus on adaptation of behavioral mismatches rather than interface mismatches. An interface mismatch is due to differences in the formats and specifications of messages exchanged that can be resolved using schema mapping and transformation tools <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b14">15]</ref>. We will extend our approach adding interface adaptation in future work. However, we do not expect that this actually impacts the presented software architectures.</p><p>The contributions of this paper are three software architectures to support the flexible formation of business chain <ref type="bibr" target="#b12">[13]</ref>, in which the protocol adaptation component is a key enabler.</p><p>The remainder of this paper is organized as follows. Section 2 describes the three flexible chain formation cases. Section 3 presents the architecture support for flexible formation of demand chains. Section 4 details the architecture to enable the flexible configuration of supply chains. Section 5 describes the architecture for flexible hybrid demand/supply chain formation. Section 6 discusses a third-party adaptation factory and Section 7 presents the conclusions and future work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Flexible Business Chain Management</head><p>There are three scenarios for flexible formation of business chains <ref type="bibr" target="#b12">[13]</ref>. Each scenario defines the responsibility of a partner to construct a protocol adaptor to resolve (if possible) incompatibilities between their business protocols. We show in Figure <ref type="figure" target="#fig_0">1</ref> a business chain to illustrate the adaptation responsibility for each business chain formation scenario. The letters outside the services in Figure <ref type="figure" target="#fig_0">1</ref> represent the place where the protocol adaptor is constructed.</p><p>This way, in a flexible demand chain formation scenario <ref type="bibr" target="#b12">[13]</ref>, the service consumer defines its business protocol according to the customer business requirements. Since the CODP is moved to the last provider in the demand chain, the responsibility of constructing an adaptor is always of the provider; see b and d in Figure <ref type="figure" target="#fig_0">1</ref>. In a flexible supply chain formation scenario <ref type="bibr" target="#b12">[13]</ref>, the service provider sets its business protocol in conformance with market standards like SCOR <ref type="bibr" target="#b2">[3]</ref> or eTOM <ref type="bibr" target="#b4">[5]</ref>. For example, the service provider can be a big retail vendor like Dell. The service consumer searches the standard service provider in the marketplace to define its business protocol. In the supply chain the CODP is moved to the service consumer, and thus the responsibility of building an adaptor is always of the service consumer; see a and c in Figure <ref type="figure" target="#fig_0">1</ref>. In a flexible hybrid demand/supply chain formation scenario <ref type="bibr" target="#b12">[13]</ref>, the service consumer and service provider form a demand chain while the service (1st-tier) provider and the 2nd-tier provider form a supply chain. Then, the CODP is at the service provider. This way, the responsibility of building an adaptor is always of the service (1st-tier) provider: it has to build an adaptor to resolve mismatches with the service consumer and 2nd-tier provider; see b and c in Figure <ref type="figure" target="#fig_0">1</ref>.</p><p>To describe the flexible formation of a business chain, we explain the hybrid demand/supply chain case since it includes the other two business chain cases. We illustrate this case in Figure <ref type="figure">2</ref>, in which the companies W and X operate in demand chain mode and companies X and Y operate in supply chain mode. Then, the company X constructs a protocol adaptor to resolve the mismatches with companies W and Y, using one of the adaptation methods presented in <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b9">[10]</ref><ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref>. In this example we use the method presented in <ref type="bibr" target="#b13">[14]</ref>. Note that the communication of messages is shown in the figure by the arrows crossing the organization borders, indicating send (source) and receive (target) actions. The company X constructs the protocol adaptors at the public process view and it deploys each adaptor in front of its business protocols. Then, the company X offers the protocol adaptors and its business protocol in the marketplace. Next, the companies W and Y select X, and then they deploy the business protocols in the architecture components.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Architecture for Flexible Demand Chain Formation</head><p>The CrossWork architecture <ref type="bibr" target="#b7">[8]</ref> was developed to support the dynamic formation and enactment of a Network of Automotive Excellence. In the CrossWork business scenario, the service consumer is an Original Equipment Manufacturer (OEM) organization like BMW or MAN. The OEM defines a certain goal or solution objective that is sent to the service provider. Then, the provider forms the chain by selecting the 2nd-tier providers from the marketplace to meet the goal. The provider composes a global business protocol with the local protocols of the 2nd-tier providers to coordinate them. Then, the provider enacts the global process that enacts the local protocols in the 2nd-tier providers to later send the Fig. <ref type="figure">2</ref>: Adaptation Case for Flexible Hybrid Demand/Supply Chain Formation result back to the OEM. We extend the CrossWork architecture by adding the architecture components to support protocol adaptation. In Figure <ref type="figure">3</ref>, we illustrate the CrossWork architecture (white boxes) plus the extension (grey boxes). The extended CrossWork architecture enables the flexible formation of a demand chain at design-time and at run-time.</p><p>At design-time, the extended CrossWork architecture is triggered by the service consumer that defines the solution objective in the goal support module according to the customer business requirements. The consumer defines its business protocol according to the goal. Then, the consumer selects the service provider from the marketplace that meets the goal. The consumer sends the goal definition and its business protocol to the service provider. Then, the service provider checks the compatibility between its business protocol and the consumer protocol. If the protocols are incompatible, the adaptor factory module constructs a protocol adaptor to resolve mismatches. The adaptor factory implements the adaptation method for tightly and loosely coupled interacting services <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b9">[10]</ref><ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref>. Then, the provider deploys the business protocol in the protocol enactment module and the protocol adaptor in the adaptor enactment module. Similarly, the service consumer deploys its business protocol in the protocol enactment module.</p><p>Next, the service provider decomposes the goal into a required set of protocols (component services) in the goal support module. Then, the team formation module finds the 2nd-tier providers in the marketplace according to the set of protocols. Next, the composition module composes the set of protocols into a global business protocol. Note that the 2nd-tier providers are not only selected by protocol compatibility. It means that while there are parts of the global Fig. <ref type="figure">3</ref>: Architecture Extension of CrossWork <ref type="bibr" target="#b7">[8]</ref> for Flexible Demand Chain Management protocol that are compatible with the 2nd-tier providers, there are other parts that are incompatible with the 2nd-tier provider protocols. This way, the 2ndtier providers check the compatibility between their business protocols and the set of protocols that compose the global protocol. If they are incompatible, the adaptor factory at the 2nd-tier providers generates a protocol adaptor. Next, each 2nd-tier provider deploys the business protocol in the protocol enactment module and the adaptor in the adaptor enactment module. Finally, the service provider deploys the global protocol in the protocol enactment module. This way, the protocols can be later executed by the service consumer and provider, enacting the demand chain with the 2nd-tier providers. At run-time, the extended CrossWork architecture enables the formation of the demand chain when the consumer business protocol is being enacted. This is illustrated with the 'reverse' dotted arrow from the protocol enactment module to the goal support module in Figure <ref type="figure">3</ref>. This way, the consumer stops the business protocol execution to configure the demand chain (at design-time) to later continue the enactment of the business protocols. Similarly, the service provider can configure the demand chain with 2nd-tier providers when its protocol is being executed. Note that if the service provider acts as integrator only <ref type="bibr" target="#b5">[6]</ref>, then the adaptation is only needed at the 2nd-tier provider. The service provider uses the protocol sent by the consumer as global business protocol. Then, the service provider is protocol compatible with the service consumer since they interact to only synchronize the control flow of the global business protocol. The global business protocol interacts with the 2nd-tier providers, which can need adaptation. In the basic CrossWork architecture, if the global protocol cannot be 5th SIKS/BENAIS Conference on Enterprise Information Systems Fig. <ref type="figure">4</ref>: Architecture Extension of CrossFlow <ref type="bibr" target="#b6">[7]</ref> for Flexible Supply Chain Management composed then the system backs up to the team formation or even to the goal support module to correct it <ref type="bibr" target="#b7">[8]</ref>. However, in the extended architecture, these backtrack steps are needed only if the adaptor factory module at the 2nd-tier provider indicates the mismatch cannot be resolved and no adaptor can be constructed <ref type="bibr" target="#b11">[12,</ref><ref type="bibr" target="#b13">14]</ref>. Note that technically the business protocols and the adaptor can be enacted using the same enactment engine or two different enactment engines.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Architecture for Flexible Supply Chain Formation</head><p>The CrossFlow architecture <ref type="bibr" target="#b6">[7]</ref> was developed to support the configuration of a supply chain, using dynamic service outsourcing. In the CrossFlow business scenario, the service consumer outsources a non-core part of its business protocol to a service provider. The service consumer takes the decision of outsourcing during the execution of its business protocol, and thus it selects the provider at the last possible moment. This way, the basic CrossFlow architecture is mainly focused on run-time supply chain configuration. Note that the architecture was developed in the pre web services era, but it conceptually supports the collaboration of two interacting services which share the business protocols at the public process view. We extend the CrossFlow architecture to support the flexible configuration of a supply chain at design-time and at run-time. We illustrate the basic architecture (white boxes) plus the extension (grey boxes) in Figure <ref type="figure">4</ref>.</p><p>At design-time, the extended CrossFlow architecture is triggered by the consumer that selects the service provider from the marketplace to outsource its protocol. Then, the provider sends its standard business protocol to the consumer that checks the compatibility with its protocol. If the business protocols are incompatible, then the service consumer constructs a protocol adaptor. Next, the service consumer couples the outsourced protocol part with its business protocol in the composition module for later deployment in the enactment module. Then, the consumer deploys the coupled business protocol in the protocol enactment module and the adaptor in the adaptor enactment module. Finally, the service provider deploys its business protocol in the enactment module after it sent the protocol definition. Similarly, the service provider can outsource part of its protocol by selecting 2nd-tier providers from the marketplace. Then, the 2nd-tier providers send their standard business protocol to the provider that checks the compatibility with its protocol. If the protocols are incompatible, then the provider adaptor factory module generates the protocol adaptor. Then, the provider couples the outsourced protocol part with its business protocol in the composition module. Next, the provider deploys the coupled protocol and the adaptor in the enactment modules while the 2nd-tier providers deploy their protocols too. This way, the protocols can be later executed by the service consumer and provider, enacting the supply chain with the 2nd-tier providers.</p><p>At run-time, the extended CrossFlow architecture supports the configuration of the supply chain when the consumer business protocol is being enacted. This is illustrated with the 'reverse' dotted arrow from the protocol enactment module to the partner selection module in Figure <ref type="figure">4</ref>. Therefore, the consumer stops the business protocol execution to configure the supply chain (at design-time) to later continue the enactment of the business protocols. Then, the service provider can also configure a supply chain with 2nd-tier providers when its protocol is being enacted. Note that if the service provider acts as integrator only <ref type="bibr" target="#b5">[6]</ref>, then the adaptation is only needed at the service consumer. The service provider preselects the 2nd-tier providers before it is selected by the consumer. Once the provider is selected, it sends the standard protocol to the consumer. The service provider is protocol compatible with the 2nd-tier providers since they interact to only synchronize the control flow of the business protocol. On the other hand, the consumer protocol interacts with the standard business protocol, which can need adaptation. Like the extended CrossWork architecture, the CrossFlow architecture technically support the enactment of the business protocols and the adaptor using the same enactment engine or two different enactment engines.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Architecture for Flexible Hybrid Demand/Supply Chain Formation</head><p>To support the flexible configuration of a hybrid demand/supply chain, we define the architecture as an extension of the CrossWork (demand chain) and CrossFlow (supply chain) architectures. We illustrate the architecture for flexible formation of a hybrid demand/supply chain in Figure <ref type="figure" target="#fig_1">5</ref>. It supports the configuration of the hybrid chain at design-time and at run-time.</p><p>5th SIKS/BENAIS Conference on Enterprise Information Systems  At design-time, the architecture is triggered by the service consumer that configures a demand chain with the provider. The consumer defines the solution objective in the goal support module according to the customer business requirements. Then, the consumer defines its business protocol according to the goal and selects the service provider from the marketplace that meets the goal. Then, the consumer sends the goal definition and its business protocol to the service provider. Next, the service provider checks the compatibility between its business protocol and the consumer protocol. If the protocols are incompatible, the adaptor factory module constructs a protocol adaptor to resolve mismatches. Then, the provider deploys the business protocol in the protocol enactment module and the protocol adaptor in the adaptor enactment module while the service consumer deploys its business protocol in the protocol enactment module.</p><p>At this stage, the service provider configures a supply chain with 2nd-tier providers. Next, the service provider decomposes the goal into a required set of protocols (component services) in the goal support module. Then, the team formation module finds the 2nd-tier providers in the marketplace according to the set of protocols. Next, the composition module composes the set of protocols into a global business protocol. Then, the 2nd-tier providers send their standard business protocol to the provider that checks the compatibility with its protocol. If the protocols are incompatible, then the provider adaptor factory module generates the corresponding protocol adaptors. Finally, the service provider deploys the global protocol and the adaptors in the enactment modules while each 2ndtier provider deploys its protocol in the enactment module too. This way, the protocols can be later executed by the services by enacting the demand chain between the consumer and provider and the supply chain between the provider and 2nd-tier providers.</p><p>At run-time, the extended architecture supports the configuration of the hybrid demand/supply chain when the consumer and provider protocols are being enacted. This is illustrated with the 'reverse' dotted arrow in Figure <ref type="figure">4</ref>. The consumer stops the business protocol execution to configure the demand chain (at design-time) to later continue the enactment of the business protocols. Similarly, the service provider stops the protocol execution to configure the supply chain (at design-time) with the 2nd-tier providers to later continue with the protocol enactment.</p><p>Note that if the service provider acts as integrator only <ref type="bibr" target="#b5">[6]</ref>, then the adaptation is needed for compatibility with either the 2nd-tier providers or the service consumer. In both cases the adaptor is constructed and deployed by the service provider. In the first case, like in the extended CrossWork case, the service provider uses the protocol sent by the consumer as global business protocol. Then, the provider and consumer protocols are compatible since they interact to only synchronize the control flow. Thus, the global business protocol parts interact with the 2nd-tier providers, which can need adaptation. In the second case, like in the extended CrossFlow case, the service provider pre-selects the 2nd-tier providers before it is selected by the consumer. Then, the provider has to generate an adaptor if the consumer and provider protocols are incompatible. The service provider and the 2nd-tier providers are compatible since they interact to only synchronize the control flow of the global business protocol parts.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Third-party Adaptor Factory</head><p>The architectures that we defined for flexible formation of business chains support the participation of a trusted third-party that provides adaptation as a service (AaaS). The third-party is an adaptor factory that constructs and enacts protocol adaptors to support the flexible configuration of business chains. This way, the service consumer, service provider or 2nd-tier providers can buy the adaptation service from the trusted third-party, and thus they do not need to add the adaptor factory module in their architectures themselves. The participation of the third-party does not cause conceptual changes to the architectures defined previously, but technically it needs to add the technology to ensure quality of services and security, which are outside the scope of this paper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="7">Conclusions and Future Work</head><p>We have presented three software architectures that considers protocol adaptation component as a key enabler of flexible chain formation. Any existing protocol adaptation approach can be used to realize the actual adaptation. The presented architectures enables the flexible formation of business chains between organizations that collaborate in a just-in-time fashion to meet a solution objective, which is very important in competitive markets.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>5th SIKS/BENAIS Conference on Enterprise Information Systems</head><p>There are several directions for future work. We plan to extend our approach adding interface adaptation to the adaptor factory. We are currently extending our approach to define a reference architecture in which the presented three software architectures can be described. Moreover, we will extend our approach to deal with adaptation of running business chains that deadlock due to the propagation of changes on the partner business protocols.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 :</head><label>1</label><figDesc>Fig. 1: Business Chain to Identify Adaptation Cases</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 5 :</head><label>5</label><figDesc>Fig. 5: Architecture for Flexible Hybrid Demand/Supply Chain Management</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>5th SIKS/BENAIS Conference on Enterprise Information Systems</figDesc><table><row><cell>Company W</cell><cell></cell><cell></cell><cell cols="2">Company X</cell><cell></cell><cell></cell><cell>Company Y</cell></row><row><cell>Fulfillment Service Consumer Public Process View</cell><cell>Public Process View Protocol Adaptor</cell><cell cols="3">Fulfillment Service Provider Public Process View Private Process View</cell><cell>Public Process View Deliver Items Service Consumer</cell><cell>Public Process View Protocol Adaptor</cell><cell>Public Process View Deliver Items Service Provider</cell></row><row><cell>SendProduct Order</cell><cell>Details RecDelivery RecProduct Order</cell><cell>RecDelivery Details</cell><cell>Set ItemList Receive Order</cell><cell>Items Put</cell><cell>TxInfo Rec Send ItemList</cell><cell>Rec Rec ItemList</cell><cell>TxInfo Send</cell></row><row><cell>SendDelivery</cell><cell>Details SendDelivery</cell><cell>RecProduct</cell><cell></cell><cell>RecTx Info</cell><cell>Items Put</cell><cell>Send Items</cell><cell>Items Rec</cell></row><row><cell>Details</cell><cell></cell><cell>Order</cell><cell></cell><cell></cell><cell></cell><cell>Items</cell><cell></cell></row><row><cell></cell><cell>SendProduct Order</cell><cell></cell><cell>Get Items</cell><cell></cell><cell></cell><cell>Send</cell><cell>Rec</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>ItemList</cell><cell>ItemList</cell></row><row><cell>RecItem</cell><cell></cell><cell>SendItem</cell><cell>Interna-tional</cell><cell>Country-side</cell><cell></cell><cell></cell><cell></cell></row><row><cell>Shipment</cell><cell></cell><cell>Shipment</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell>Send</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell></cell><cell>Items</cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Automated generation of BPEL adapters</title>
		<author>
			<persName><forename type="first">A</forename><surname>Brogi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Popescu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. ICSOC&apos;06</title>
				<meeting>ICSOC&apos;06</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2006">2006</date>
			<biblScope unit="page" from="27" to="39" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Workflow view driven cross-organizational interoperability in a web service environment</title>
		<author>
			<persName><forename type="first">D</forename><surname>Chiu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Cheung</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Till</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Karlapalem</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Kafeza</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Technology and Management</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="issue">3-4</biblScope>
			<biblScope unit="page" from="221" to="250" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<ptr target="http://www.supply-chain.org" />
		<title level="m">SCOR: Supply-Chain Operations Reference model; version 9</title>
				<imprint>
			<date type="published" when="2008">2008</date>
			<biblScope unit="volume">0</biblScope>
		</imprint>
		<respStmt>
			<orgName>Supply Chain Council</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Constructing customized process views</title>
		<author>
			<persName><forename type="first">R</forename><surname>Eshuis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Grefen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Data and Knowledge Engineering</title>
		<imprint>
			<biblScope unit="volume">64</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="419" to="438" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">eTOM: enhanced Telecom Operations Map</title>
		<author>
			<persName><surname>Tm Forum</surname></persName>
		</author>
		<ptr target="http://www.tmforum.org/" />
		<imprint>
			<date type="published" when="2008">2008</date>
			<biblScope unit="volume">8</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">Mastering E-Business</title>
		<author>
			<persName><forename type="first">P</forename><surname>Grefen</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2010">2010</date>
			<publisher>Routledge</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">CrossFlow: Cross-Organizational Workflow Management in Dynamic Virtual Enterprises</title>
		<author>
			<persName><forename type="first">P</forename><surname>Grefen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Aberer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Hoffner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Ludwig</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Systems Science &amp; Engineering</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="277" to="290" />
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Internet-based support for process-oriented instant virtual enterprises</title>
		<author>
			<persName><forename type="first">P</forename><surname>Grefen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Eshuis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Mehandjiev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Kouvas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Weichhart</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Internet Computing</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="65" to="73" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Business-to-business workflow interoperation based on process-views</title>
		<author>
			<persName><forename type="first">D-R</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Shen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Decision Support Systems</title>
		<imprint>
			<biblScope unit="volume">38</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="399" to="419" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Adaptation of service protocols using process algebra and on-the-fly reduction techniques</title>
		<author>
			<persName><forename type="first">R</forename><surname>Mateescu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Poizat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Salaün</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. ICSOC&apos;08</title>
				<meeting>ICSOC&apos;08</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="84" to="99" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Protocol-aware matching of web service interfaces for adapter development</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">R</forename><surname>Motahari Nezhad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">Y</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Benatallah</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. WWW&apos;10</title>
				<meeting>WWW&apos;10</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="731" to="740" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Constructing minimal protocol adaptors for service composition</title>
		<author>
			<persName><forename type="first">R</forename><surname>Seguel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Eshuis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Grefen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. WEWST &apos;09</title>
				<meeting>WEWST &apos;09</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page" from="29" to="38" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Business protocol adaptation for flexible chain management</title>
		<author>
			<persName><forename type="first">R</forename><surname>Seguel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Eshuis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Grefen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">On the Move to Meaningful Internet Systems: OTM 2010</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<editor>
			<persName><forename type="first">Robert</forename><surname>Meersman</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Tharam</forename><surname>Dillon</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Pilar</forename><surname>Herrero</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="volume">6426</biblScope>
			<biblScope unit="page" from="438" to="445" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Minimal protocol adaptors for loosely coupled services</title>
		<author>
			<persName><forename type="first">R</forename><surname>Seguel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Eshuis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Grefen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. ICWS&apos;10</title>
				<meeting>ICWS&apos;10</meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="417" to="424" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Towards integrated service adaptation -a new approach combining message and control flow adaptation</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Shan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kumar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Grefen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. ICWS &apos;10</title>
				<meeting>ICWS &apos;10</meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="385" to="392" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Protocol specifications and component adaptors</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">M</forename><surname>Yellin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">E</forename><surname>Strom</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Transactions on Programming Languages and Systems (TOPLAS)</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="page" from="292" to="333" />
			<date type="published" when="1997">1997</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
